General
-
Target
PO OAU_FEBQTRFA00541·PDF.scr.exe
-
Size
1022KB
-
Sample
240223-t1d6pseb81
-
MD5
6b934d2c72027f89729ac4f6fea69b4a
-
SHA1
9cd343ee1496300792ccab60879fdf528291302c
-
SHA256
b8f57ab21e46de7db9ee6c9366251b88b1ba62013154c12bc92c3acbd44058d0
-
SHA512
2a647f55e4ca0d479ede2b2819d3dd5826a94e427831d5c385cc49f4c5823f21bc5528167f393fe831ef334e5a0ba0000cd68e19695a576ad933de8f7a0725c1
-
SSDEEP
12288:P5Bx4XQ7GpyCv5gIuxM7QCA/QiBf2jlBqd+vZyA5GcXrHvcxFv2wj9L1xN:RBx0IGpyGWzxM41RqLu+wcL0xosL1
Static task
static1
Behavioral task
behavioral1
Sample
PO OAU_FEBQTRFA00541·PDF.scr.exe
Resource
win7-20240221-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
Rich6#3Y$hT!3V - Email To:
[email protected]
Targets
-
-
Target
PO OAU_FEBQTRFA00541·PDF.scr.exe
-
Size
1022KB
-
MD5
6b934d2c72027f89729ac4f6fea69b4a
-
SHA1
9cd343ee1496300792ccab60879fdf528291302c
-
SHA256
b8f57ab21e46de7db9ee6c9366251b88b1ba62013154c12bc92c3acbd44058d0
-
SHA512
2a647f55e4ca0d479ede2b2819d3dd5826a94e427831d5c385cc49f4c5823f21bc5528167f393fe831ef334e5a0ba0000cd68e19695a576ad933de8f7a0725c1
-
SSDEEP
12288:P5Bx4XQ7GpyCv5gIuxM7QCA/QiBf2jlBqd+vZyA5GcXrHvcxFv2wj9L1xN:RBx0IGpyGWzxM41RqLu+wcL0xosL1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-